Pidgin < 2.10.5 mxit_show_message Function RX Message Inline Image Parsing Remote Overflow

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.


Synopsis :

An instant messaging client installed on the remote Windows host is
affected by a buffer overflow vulnerability.

Description :

The version of Pidgin installed on the remote host is earlier than
2.10.5. As such, it is potentially affected by a stack-based buffer
overflow vulnerability.

An error in the function 'mxit_show_message' in the file
'libpurple/protocols/mxit/markup.c' can allow a stack-based buffer
overflow to occur when parsing a received message containing inline
images. This can result in application crashes and potentially
arbitrary code execution.

See also :

http://hg.pidgin.im/pidgin/main/rev/ded93865ef42
http://www.pidgin.im/news/security/?id=64

Solution :

Upgrade to Pidgin 2.10.5 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 59969 ()

Bugtraq ID: 54322

CVE ID: CVE-2012-3374

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now